In response to state-directed Internet filtering and monitoring regimes many forms of circumvention technologies have emerged in order to allow users to bypass filtering restrictions. In general, circumvention technologies work by routing a user’s request from a country that implemented filtering through an intermediary machine that is not blocked by the filtering regime. This computer then retrieves the requested content for the censored user and then transmits the content back to the user.

There are numerous projects to develop technologies that would enable citizens and civil society networks to secure themselves against, or work around, Internet censorship and surveillance. Circumvention technologies are often targeted towards different types of users with varying resources and levels of expertise. This chapter guides users through the process of selecting a circumvention technology that meets the users specific needs.